By Topic

Education Technology and Computer Science (ETCS), 2010 Second International Workshop on

Date 6-7 March 2010

Go

Filter Results

Displaying Results 1 - 25 of 220
  • [Front cover - Vol 3]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 3]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (411 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents - Volume 3

    Publication Year: 2010, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Message from the Workshop Chairs - Volume 3

    Publication Year: 2010, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 3

    Publication Year: 2010, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Committee Members - Volume 3

    Publication Year: 2010, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Rotation Invariant Texture Measured by Local Binary Pattern for Remote Sensing Image Classification

    Publication Year: 2010, Page(s):3 - 6
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Studies on rotation invariant texture in remote sensing image processing are relatively rare. Local Binary Pattern (LBP) is a relatively new rotation invariant texture measure which is theoretically simply but powerful. In this paper, the LBP operator was proposed to calculate texture features of the stimulant image derived from high-resolution remote sensing image. The produced texture image was ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shuffled Frog Leaping Algorithm for Materialized Views Selection

    Publication Year: 2010, Page(s):7 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Materialized view selection is one of the key techniques for speeding up query answer in a data warehouse environment. To effectively and efficiently deal with this problem, a novel shuffled frog leaping (SFL) algorithm for materialized view selection is proposed in this paper. Experimental results on the TPC-D benchmark data sets show that the proposed algorithm out-performs other well-known algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • License Plate Character Recognition Based on Gaussian-Hermite Moments

    Publication Year: 2010, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Character recognition plays an important role in the automatic license plate recognition (ALPR) system. In this paper, we propose a new method to recognize the license plates characters by using 2D Gaussian-Hermite moments (GHMs) of different orders with 231 GHMs features as the input vector of BP neural network. The system worked under variable illumination, variable size of plate and dynamic bac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Microscopic Image Segmentation Technology in Locust-Control Pesticide Research

    Publication Year: 2010, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    The microscopic slice image segmentation of the interacting tissues between locust and bio-pesticide is very important in aspects of illuminating the interactive processes between the locust organs and the bio-pesticide, revealing the infective mechanism of the bio-pesticide to locust, and optimizing the biological agriculture chemical preparation. The classic image segmentation algorithms, such a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OTP-W: Octree Partition-Based 3D Mesh Watermarking

    Publication Year: 2010, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    A robust blind watermarking algorithm of 3D models based on Octree partition is proposed: OTP-W. Primary Component Analysis and Octree partition are used on 3D meshes. A scrambled RGB image is embedded adaptively into the single child nodes at the bottom level of Octree structure. The watermark can be extracted without the original image and 3D model. This method has a high embedding capacity for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Angle-Measuring Algorithm for the Stepped-frequecy Radar Based on Dual-line Digital Phase Interferometer

    Publication Year: 2010, Page(s):23 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    The phase interferometer is very important in the direction-finding and position of target. In this paper, the phase interferometer is employed to angle measurement of the stepped frequency radar target. By the way of dual-line digital phase interferometer, the contradiction between direction range and direction accuracy is solved. The effect of SNR and AOA on the accuracy of angle measurement is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Fusion Algorithm Based on Pulse Coupled Neural Networks and Nonsubsampled Contourlet Transform

    Publication Year: 2010, Page(s):27 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB) | HTML iconHTML

    The principles and features of nonsubsampled contourlet transform (NSCT) and pulse coupled neural networks (PCNN) are described in brief. Combining their characteristics, in NSCT domain, a new image fusion algorithm based on PCNN is proposed in this paper. Directional contrast and regional spatial frequency in NSCT domain is input to motivate PCNN and coefficients in NSCT domain with large firing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TM-RMRP: A Trust Model Based on a Recommendation Mechanism of Rewards and Punishments

    Publication Year: 2010, Page(s):31 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    As trust management can address the new security challenges in pervasive computing environments, we present our pervasive trust model TM-RMRP which is composed of input factors and trust evaluation. With the model presented, anonymous entities can collaborate with trustful parties without central security managers. To reduce or even avoid inappropriate or inaccurate recommendations, we introduce t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Optimization for Flash Memory Database in Mobile Embedded System

    Publication Year: 2010, Page(s):35 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    The trend of recent technological in flash media have made it an attractive choice for non-volatile data storage in a wide spectrum of computing devices, such as PDA' s, mobile phones, MP3 players, embedded sensors, etc. Compared with the disk drivers, the success of flash media for those devices is mainly due to its superior merits for smaller size, lighter weight, better shock resistance, lower ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A Modified Model of Fuzzy Time Series for Forecasting Exchange Rates

    Publication Year: 2010, Page(s):40 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (422 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Heuristic Structure Mutation Operator Based on Sensitivity for Evolutionary Neural Network

    Publication Year: 2010, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Node deletion and node addition are two important types of structure mutations for evolutionary neural network (ENN). How to select mutation type and mutation node has a crucial impact on the performance of ENN. In order to improve the convergence speed and classification accuracy of ENN, a heuristic structure mutation operator (HSMO) based on sensitivity was proposed. The output sensitivity of EN... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Ant-Based EM Algorithm for Network Link Delay Distributions Inference

    Publication Year: 2010, Page(s):48 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Inference of network internal link characteristics has become an increasingly important issue for network monitor and network management. In this paper, an improved ant-based EM algorithm was proposed for network link delay distributions inference. We use improved ant colony algorithm to accelerate the convergence speed of EM algorithm. The experiment result indicates the improved ant-based EM alg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Genetic Multiple Kernel Relevance Vector Regression Approach

    Publication Year: 2010, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Relevance vector machine (RVM) is a state-of-the-art technique for regression and classification, as a sparse Bayesian extension version of the support vector machine. The kernel function and parameter selection is a key problem in the research of RVM. The real-world application and recent researches have emphasized the requirement to multiple kernel learning. This paper proposes a novel regressio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pedestrian Detection Based on a New Two-Step Framework

    Publication Year: 2010, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    In this paper, we propose a new framework in pedestrian detection using a two-step classification algorithm, which is a ¿coarse to fine¿ course. The framework consists of a full-body detection (FBD) step and a head-shoulder detection (HSD) step. The FBD step uses fusion of Haar-like and HOG features to get better performance, and the HSD step utilizes edgelet features for classification and dete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A Novel Marine Traffic Safety Assessment Based on Cloud Models

    Publication Year: 2010, Page(s):60 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (906 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PEGASIS Protocol in Wireless Sensor Network Based on an Improved Ant Colony Algorithm

    Publication Year: 2010, Page(s):64 - 67
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    This paper proposes a routing protocol for the applications of Wireless Sensor Network (WSN). It is a protocol based on the PEGASIS protocol but using an improved ant colony algorithm rather than the greedy algorithm to construct the chain. Compared with the original PEGASIS, this one, PEG-ant, can achieve a global optimization. It forms a chain that makes the path more even-distributed and the to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.